Suivre

WSpot's misconfigured Amazon S3 Bucket was left in open form, exposing the sensitive information of potentially millions of Brazilian citizens. We discovered 2 different file types exposed on the open database - SMS logs and guest reports. There may be more information exposed that was not visible in our sample data. 84MB of files containing SMS logs were found on WSpot's database. There were an estimated 280,000 total log entries of this type. SMS logs leaked two forms of personal and confidential visitor data. This data belongs to the people that connected to each WSpot client's .

safetydetectives.com/blog/wspo

Inscrivez-vous pour prendre part à la conversation
nanao

Comme le soleil, les machines ne se couchent jamais.